INFORMATION GATHERING
Hey guys how are you today we are going to discuss about information gathering.
Information gathering is the first step of Ethical Hacking, where the penetration tester or even hackers gather information on their target victims. To increase your chances of a “successful” hacking.
Back to website hacking, there are three approaches that one can take when planning to perform a hack on a website/web app. These approaches include:-
Server-side Attack
Client-side Attack
Web Application Pen testing.
As mentioned earlier, every attack begins with information gathering. There is a couple of information that one can gather during the process. These include but are not limited to:
1] Victim IP addresses
2] Domain Name Information
3] Technologies used by the website/web applications
4] Other websites on the same server
DNS records
This information could help you perform a successful hack on a website/ web app.
In this article, I will be showing you how to use some tools to gather information about a target website/web app. We will start with:-
1. Whois Lookup (https://whois.domaintools.com/)
Whois is an online tool that helps one to lookup information of the target website/web app such as Domain name, IP address block or an autonomous system but it is also used to query for a wider range of information. The information that is provided in the Whois lookup is publicly available unless the website is using domain privacy.
How to use Whois Lookup
You can either visit the whois site here (https://whois.domaintools.com/) and type in the domain name of the target website then it’s going to give you the website information or you can type this on the terminal
whois <domain_name_of_target)
2. Netcraft(https://netcraft.com)
If you are gathering in-depth information on the technologies used in a website/web app, you could use the following website: netcraft.com
That's all for today's guys hope you will understand it. And please don't forget to follow us on Instagram and GitHub and do like our content on Instagram:
Comments
Post a Comment